FTP: The Overlooked Achilles Heel

The article discusses the risk in transporting or storing electronic data via File Transfer Protocol (FTP). FTP is described like a car without seatbelts, offering nothing beyond the basic transportation of the data. It demonstrates that it could be taken for granted and become subject to carelessness. Several scenarios depicting FTP data breaches are elaborated.

ACCESSION #

31203040

Related Articles

The article offers tips on how one can transfer confidential files securely while traveling. If one is traveling, there are many ways he or she can get it are e-mail, iDisks, and online file services such as SendThisFile or YouSendIt. But these file-transferring tools are not secure for...

Reports on security flaws discovered in the File Transfer Protocol server software of three vendors. Serious failures attributed to the vulnerabilities; Initiatives of vendors to patch up the vulnerabilities of their server software.

The article reports on the launching of the Proofpoint Secure File Transfer by the Proofpoint, Inc. in the U.S. The author stated that the Proofpoint Secure File Transfer enables end users to send large files quickly and easily, while minimizing the impact of large attachments on their...

Examines the capabilities and limitations of common data transfer alternatives available for companies to maximize their investment in data transmission. Discussion on encrypted media, such as tapes, compact discs, and cartridges; Objectives of file transfer protocol (FTP); Availability of FTP...

The TCP Selective ACK (SACK) is used to notify information on the sequence space of the receiving buffer to the sender. By definition of RFC 2018, however, each SACK block has to be described by the two 32-bit unsigned integers, which may introduce significant extra load in the reverse ACK path...

The article reports on features added to file transfer protocol (FTP) facility provided by Ipswitch Inc. Ipswitch continues to polish its FTP client, making it a reliable choice for IT managers and a more secure utility for users who routinely transfer files. The tests showed that this was a...

A definition of the term "DOCSIS Configuration File" in networking is presented. It refers to the file containing configuration parameters for a Data Over Cable Service Interface Specification (DOCSIS) cable modem. Using the Trivial File Transfer Protocol, the cable modem obtains DOCSIS...

An encyclopedia entry for "Simple Mail Transfer Protocol" is presented. It refers to a protocol designed to transfer electronic mails reliably and efficiently. The mail service is modeled after the File Transfer Protocol file transfer service. The protocol has the ability to transfer mail...

Reliability is very important in digital radio point to point transmission system, especially for bulk data transfer in narrow band channel. Aiming at currently most applications are based on raw UDP service which does not guarantee the reliability, the article presents R2UDP(Reduced Reliable...